178
Page views
3
Files
0
Videos
0
R.Links

Icon
Syllabus

UNIT
1
Computer Basics

Unit I: Computer Basics – Understanding Computer Hardware, Looking Inside the Machine, Components of a Digital Computer, The Role of the Motherboard, The Roles of the Processor and Memory, The Role of Storage Media, Language of the Machine

UNIT
2
Computer Forensic Fundamentals: –

Unit II: Computer Forensic Fundamentals: – Computer Forensic Services - Types of Computer Forensic Technology - Types of Military Computer Forensic Technology - Types of Business Computer Forensic Technology, Types of Computer Forensics Systems Intrusion Detection Systems Firewall Security Systems Storage Area Network Security Systems Network Disaster Recovery Systems Public Key Infrastructure Systems Wireless Network Security Systems Satellite Encryption Security Systems Instant Messaging (IM) Security Systems Net Privacy Systems Identity Management Security Systems Identity Theft Biometric Security Systems Homeland Security Systems.

UNIT
3
Operating System Investigation

Unit III : Operating System Investigation - Window, Windows Everywhere 3.2. NTFS Overview - Forensic Analysis of NTFS MFT – Metadata -. Artifacts of User Activities .Deletion and Destruction of Data - Windows Internet and Communications Activities Windows Process Memory- .Bitlocker and EFS - RAIDs and Dynamic Disks

UNIT
4
Unix/Linux Operating System Investigation

Unit IV Unix/Linux Operating System Investigation: Introduction to Unix. Boot Process. Forensic Duplication Consideration File Systems. User Accounts. System Configuration Artifacts of User Activities. Internet Communications - Firefox Cache Saved Sessions E-Mail Analysis Chat Analysis Memory and Swap Space.

UNIT
5
Overview of hardware and operating systems:

Unit V Overview of hardware and operating systems: structure of storage media/devices; windows/Macintosh/ Linux -- registry, boot process, file systems, file metadata. Data recovery: identifying hidden data, Encryption/Decryption, Steganography, recovering deleted files. Digital evidence controls: uncovering attacks that evade detection by Event Viewer, Task Manager, and other Windows GUI tools, data acquisition, disk imaging, recovering swap files, temporary &cache files

Reference Book:

REFERENCE MATERIALS Scene of the Cybercrime – Computer Forensics Handbook, Debra Littlejohn Shinder, Ed Tittel, Syngress Publishing Inc., 2002, ISBN 1-931836-65-5 Handbook of Digital Forensics and Investigation, Edited by Eoghan Casay, Elsevier Academic Press, ISBN 13 978-0-12-374267-4 E-SOURCES 1. www.cftt.nist.gov/) 2. http://www.computerforensicsworld.com/ 3. http://www.computer-forensic.com/ 4. http://www.digitalforensicsmagazine.com/ 5. http://www.jdfsl.org/

Text Book:

TEXT: Computer Forensics – Computer Crime Scene Investigation, Second Edition, John R. Vacca, Charles River Media Inc., ISBN 1-58450-389-0

 

Print    Download